1 / 21

PKCS#15 - an ICC File Format Recommendation

PKCS#15 - an ICC File Format Recommendation. Magnus Nyström RSA Laboratories PKCS Workshop October 1998. Agenda. Introduction, motivation The proposal - an overview Issues Experiences from the SEIS work Hans Nilsson, AU Systems AB

smorton
Download Presentation

PKCS#15 - an ICC File Format Recommendation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PKCS#15 - an ICC File Format Recommendation Magnus Nyström RSA Laboratories PKCS WorkshopOctober 1998 RSA Data Security, Inc.

  2. Agenda • Introduction, motivation • The proposal - an overview • Issues • Experiences from the SEIS work Hans Nilsson, AU Systems AB • Experiences from DC/SC Scott Guthery, Microsoft • Discussion

  3. Introduction • What is a ‘card format’? • A detailed description on how certain higher-level abstractions such as keys and certificates is represented on a particular card in terms of files, directory structure, etc • It can also contain recommendations about commands to use and access control rules

  4. Introduction, cont. • Are there any standardized formats? • ISO has laid out the foundations in ISO 7816-4, defining file types and commands for accessing them • There is no generally recognized standard format

  5. Introduction, cont. • So, card issuers have implemented their own formats, bound to their applications • There are standardized APIs aimed towards tokens like smart cards • But since there is no standard smart card format, users can’t receive full benefit from them

  6. Conclusion • A common card file format recommendation offers interoperability benefits for: • -Users (Card Holders) • -Card Issuers • -Application Vendors This is the goal of PKCS#15 - The ICC File Format Recommendation

  7. PKCS#15 Part II: An Overview of the Proposal RSA Data Security, Inc.

  8. Format Characteristics and Requirements • Useful on both crypto-capable cards as well as stored-value cards • Supports multiple applications • Supports whole domain of PKCS#11 objects

  9. Format Characteristics and Requirements, cont. • Straightforward to do PKCS#11 interface, but not tied to PKCS#11 • Profiling possible • Based on, and an application of, ISO 7816

  10. Card layout MF DF(PKCS15) Other DFs TokenInfo ODFs PinInfo Object More Objects

  11. Summary • PKCS#15: • enables true card interoperability between card-aware applications • allows profiling for particular uses, like Electronic Identity cards • is based on PKCS#11 objects • is tentatively targeted for v1.0 in Q1 1999

  12. PKCS#15 Part III: Issues and Discussion RSA Data Security, Inc.

  13. Issues (in no particular order) • How to recognize supported algorithms • How to recognize supported commands? • # of PINs? PKCS#11 only supports one. • Encoding of data: ASN.1/[PD]er or XDR or other (or several)?

  14. Issues, cont. • Relationship to other initiatives (MultOS, PC/SC (CAPI), JavaCard)? • Support for pure memory cards? • Specific card implementation details? • CA certificates on the card? • Several ODFs (keys, certs, etc) or none (implicit searching via File Identifiers)?

  15. How to proceed? • Suggest a separate mailing list, e.g. pkcs-15@rsa.com • Goal is to reach a ‘final’ version during Q1 ‘99 • Comments, feedback is solicited and welcome

  16. An Alternative: Formal profiling -- Information object classes PKCS15-PROFILE ::= CLASS { &id OBJECT IDENTIFIER UNIQUE, &Type WITH SYNTAX { &Type IDENTIFIED BY &id } PROFILE-PARAMETERS ::= CLASS { &privKeyLength INTEGER, &noPrivateKeys INTEGER,... } WITH SYNTAX { THE NUMBER OF DATA OBJECTS ARE &noDataObjects THE NUMBER OF PRIVATE KEYS IS &noPrivateKeys THE PRIVATE KEY LENGTH SHALL BE &privKeyLength THE OBJECT IDENTIFIER IS &oid ... }

  17. Alternative: Formal profiling, cont. generic-pkcs15-profile { PKCS15-PARAMETERS : params } PKCS15-PROFILE ::= { { ODF { params } IDENTIFIED BY { params.&oid } } eid-params PROFILE-PARAMETERS ::= { THE NUMBER OF DATA OBJECTS IS 0 THE NUMBER OF PRIVATE KEYS IS 2 THE PRIVATE KEY LENGTH SHALL BE 1024 THE OBJECT IDENTIFIER IS { eid-oid } } eid-profile PKCS15-PROFILE ::= generic-pkcs15-profile { eid-params }

  18. Alternative: Formal Profiling, cont. ODFContents {PKCS15-PARAMETERS params} ::= SEQUENCE { version INTEGER, privateKeys PrivateKeys {params}(SIZE(&params.noPrivKeys), publicKeys PublicKeys {params}, secretKeys SecretKeys {params}, certificates Certificates {params}, dataObjects DataObjects {params}, } PKCS15PrivateKey {PKCS15-PARAMETERS : params }::= SEQUENCE { key INSTANCE OF PKCS15-KEY {params} pKCS15CommonObjectAttributes PKCS15CommonObjectAttributes, pKCS15CommonKeyAttributes PKCS15CommonKeyAttributes, pkCS15CommonPrivateKeyAttributes PKCS15CommonPrivateKeyAttributes }

  19. Alternative: Formal Profiling, cont. PKCS15PrivateRSAKey {PKCS15-PARAMETERS : params }::= SEQUENCE { modulusLength INTEGER { params.&privKeyLength }, subjKeyHash OCTET STRING, path [1] IMPLICIT PKCS15Path OPTIONAL, value [2] IMPLICIT PKCS15RSAPrivateKey OPTIONAL } (WITH COMPONENTS {..., path PRESENT, value ABSENT} | WITH COMPONENTS {..., path ABSENT, value PRESENT})

  20. Alternatives to ASN.1: SSL notation enum { xx_rsa_private_key(1), xx_ec_key(2), xx_certificate(3), xx_secret_key(4) , (255) } XXObjectType; struct { /* something */ } XXRSAPrivateKey; struct { /* something */ } XXECKey; struct { /* something */ } XXCertificate;

  21. Alternatives to ASN.1, cont. struct { /* something */ } XXSecretKey; struct { XXObjectType type; switch (type) { case xx_rsa_private_key: XXRSAPrivateKey; case xx_ec_key: XXECKey; case xx_certificate: XXCertificate; case xx_secret_key: XXSecretKey; } } XXObject; struct { XXObject objects<0..2^16-1> } XXWholeStuff;

More Related